By using the Internet and its services, such as social media, we leave behind data about ourselves. This data can potentially be used for attacks. For example, bloggers’ addresses and vacation times can be found and used for theft. Even pseudonyms can be correlated if things go wrong. It is, therefore, important to think in […]
Identity theft refers to the misuse of personal data, such as ID number, address, or credit card number, of a natural person by third parties. This can happen not only in the analog world, but also digitally, for example, through successful phishing attacks.
Fallback Authentication describes the authentication method that is used if one of the commonly used factors does not work. The nerdhorn usually authenticates itself via face recognition on the smartphone. However, it is no longer recognized by the mask, for example. As an alternative, the font counts here. As is the case here, the alternative […]
Account or credential stuffing is an attack in which the attacker tries out stolen credentials, usually username / email address and password, on many different websites. This attack can be automated by tools for automation in the web area, such as Selenium, curl or PhantomJS, or special tools such as SNIPR or STORM. This attack […]
Phishing refers to attempts to impersonate a trustworthy communication partner via fake websites, e-mails or other messages in order to obtain personal data, for example. As a result, for example account theft or identity theft can be committed or malware can be installed. Phishing is one of the social engineering attacks that exploit the victims’ […]